Dr. rer. nat. Hellmuth Broda

Size: px
Start display at page:

Download "Dr. rer. nat. Hellmuth Broda"

Transcription

1 International Telecommunication Union Privacy, Security, and Trust with Federated Identity Management Dr. rer. nat. Hellmuth Broda Distinguished Director and CTO, Global Government Strategy, Sun Microsystems Inc. Spokesperson, Liberty Alliance; Member of the Business Marketing Expert Group Member, Swiss Academy of Engineering Sciences; VP, Scientific Advisory Board

2 Life With An Identity Mess A typical intensive IT user has 21 passwords 49% write their passwords down or store in a file on their PC Majority use common words for passwords; 67% rarely or never change their passwords * Source: NTA Monitor Password Survey, UK; zdnet.com Password proliferation increases Help Desk Calls In a non-automated support model, password reset costs range from $51 to $147 for the labor alone (Gartner) In an average 10,000 employee size company, about 45% of helpdesk calls are requests for password resets. (Meta Group) Identity Silos (Source: Sun Customer Survey) Typical IT: 10 different apps or services that contain identity profiles Over 80% of companies have no Identity synchronization solution

3 How Did Computing Live Without Identity? Location was an implicit proxy for Identity

4 Enter Liberty Liberty Alliance provides the means to build the Common Framework for Federated Identity Management Technology Policy Knowledge Certifications Over 150 diverse member companies and organizations from around the world: Government organizations End-user companies System integrators Software and hardware vendors Huge adoption: Close to a billion identities already under Liberty standards

5 Who Is the Liberty Alliance? o Consortium developing open standards For federated identity management In coordination with other standards groups o Develops open specifications that anyone can implement Liberty does not deliver specific products or services o Conformance testing & certification to ensure interoperability 30+ Liberty-enabled products and services currently available o Addresses business & policy issues of identity Guidelines, best practices documents, checklists Support for global privacy regulations built into specs

6 o o Who is the Liberty Alliance? Global collection of diverse member organizations representing leaders in IT, mobility, government, manufacturing, finance and consumer services. About 145 members total Management Board and Sponsor members include:

7 The biggest concern of the principal/patient/customer is privacy Privacy does not mean that nobody knows nothing about me* It is about managing the faith of the principal/patient/customer by adhering to the agreed scope and holding the information in trust Customers are afraid of Purpose Creep What could an architecture for privacy and trust management look like? *The Sopranos How We Can Build Trust

8 Architecture for Trust Management Identity Management Policy Authorization A combination of business and technology practices which define how a relationship is conducted and services are performed A set of rules governing decisions about what the user can do: access to information, services or resources Security Management Authentication Identity Assertion of validity of a set of credentials. Credentials express a person s identity. A Yes/No answer Basic set of information that creates a unique entity (a name with a corresponding set of attributes)

9 Identity Management Security Management Architecture for Trust Management Real World Example: Policy Authorization Authentication Identity 4. The fact that we do have police; the rules that allow me to drive with my national license in other countries 3. The policeman will then see which kind of vehicle you are authorized to drive and if you are allowed to drive the one you are operating now 2. Assertion of validity: The policeman compares the document with you. Result: A Yes/No answer 1. Name, address, picture identify the driver and provide together with the document the credentials expressing that the carrier is identical to the person that passed the driving tests Drivers License

10 Identity Management Architecture for Trust Management Policy Authorization Digitally Speaking Business practices to manage risk, enforce security/privacy, provide auditability. User, customer preferences, history, personalized services, 3. Determination of access rights to systems, applications and information: Match credentials against profiles, ACLs, policy Security Management Authentication Identity 2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting them is indeed the person to which credentials were originally issued. accept or reject 1. User, customer, device facts, e.g., name, address, ID, DNA, keys; credentials, certificates that were issued e. g. by a Certification authority

11 Policy and its audit have to be guaranteed and certified by a approved public or private independent organization, e. g.: How People Will Trust Policies Federal or state data protection agency TÜV (private institution) Audit firm Chamber of Commerce Postal Service or other basic service provider,... This can be achieved with defined processes and responsibilities similar to ISO 9000 Trust is based on policies and the audit of those -- not just on security

12 Where to Safeguard User's Information ITU-T Credit History Health History Travel History Single Identity Operator Insurance Records Meal Preferences Health History Loyalty Program Insurance Health & Travel Records Insurance Travel Agent Travel Histor y Retail Bank Airline Credit History Hotel Chain Car Rental Meal Preferences Meal Preferences Car Type Preferences

13 Liberty Promotes Privacy and Security o Federated structure means no single centralized data storage that would be vulnerable to attack o End user has more control of data because permissions travel with data, guiding its use o No global identifier--model protects against unauthorized data sharing

14 Circle of Trust organizations and individuals (example healthcare) Business relationships based on Liberty architecture & operational agreements Enables patients, physicians and healthcare organizations to safely share information in a secure and apparently seamless environment Without violating privacy How it Happens Principal e.g. Patient Service Provider e.g. Hospital Identity Identity Provider Provider Authentication Authentication Federation Federation Discovery Service Discovery Service Personal Profile Personal Profile Principal Principal Principal e.g. e.g. Physician e.g. Physician Physician Circle of Trust Service Provider e.g. Physician Identity-Based Web Service Provider e.g. eprescriptions.com Service Provider e.g. Pharmacy

15 The Liberty Advantage ITU-T o Wide-spread adoption 1 billion identities under Liberty protocols Multiple vendor competition Freedom of choice o Convergence with other standards e.g., SAML2.0, Shibboleth o Federated authentication model No central point of failure o Built on standards Works with existing legacy systems and future development plans o Privacy & security best practices Create trust for all participants o Conformance testing & certification Provides for multi-product interoperability

16 More On Liberty:

17 Liberty Adoption o T-Com Netzausweis (1 st prize IDDY award) o American Express o General Motors & Fidelity Investment Portal B2E o Vodafone Vodafone live! o France Telecom Mobile phone convergence o Radio@AOL o ADAE Citizen portal o Sun & BIPAC, Sun & ext. HR Services outsourcing More than one billion Liberty-enabled identities and devices by the end of 2006 and that s just what we know about

18 Examples of Identity Projects Biometrics for Secure Authentication The Future of Identity in the Information Society Government User IDentity for Europe November 24, 2006

19 Summary o In most projects technology was rarely the issue o Legal and business agreements are the hard parts o It is mandatory to use an open standards based approach o Shop for Liberty interoperable products and solutions o Liberty specifications are free and there to be used o Become a member to contribute to the Liberty work

20 Recommendation and Conclusion National and international interoperability with trust and privacy is key Build on existing standards Embrace Federated Identity for role based access and to protect customer's information Federated Identity scales much better than hierarchical approaches. Truly enhances business agility Join the Alliance at http//:

Managing Trust in e-health with Federated Identity Management

Managing Trust in e-health with Federated Identity Management ehealth Workshop Konolfingen (CH) Dec 4--5, 2007 Managing Trust in e-health with Federated Identity Management Dr. rer. nat. Hellmuth Broda Distinguished Director and CTO, Global Government Strategy, Sun

More information

IDENTITY MANAGEMENT AS PREREQUISITE FOR SECURE END-TO-END NETWORK BASED TRANSACTIONS

IDENTITY MANAGEMENT AS PREREQUISITE FOR SECURE END-TO-END NETWORK BASED TRANSACTIONS IDENTITY MANAGEMENT AS PREREQUISITE FOR SECURE END-TO-END NETWORK BASED TRANSACTIONS Lugano Communication Forum 2006 Dr.rer.nat. Hellmuth Broda Distinguished Director and European Chief Technology Officer

More information

Privacy, Security, and Trust with Federated Identity Management

Privacy, Security, and Trust with Federated Identity Management Privacy, Security, and Trust with Federated Identity Management Dr. Hellmuth Broda Distinguished Director and European CTO, Sun Microsystems Spokesperson, Member of the Business Marketing Expert Group,

More information

Developing a business model for Identity Management. Dr. Hellmuth Broda, VP Business Development, First Ondemand Spokesperson, Liberty Alliance

Developing a business model for Identity Management. Dr. Hellmuth Broda, VP Business Development, First Ondemand Spokesperson, Liberty Alliance Developing a business model for Identity Management Dr. Hellmuth Broda, VP Business Development, First Ondemand Spokesperson, Liberty Alliance Life With An Identity Mess A typical intensive IT user has

More information

The Role of Open Systems in Innovation Management Hochschule St. Gallen, Reihe Innovation und Führung 14. April 2008

The Role of Open Systems in Innovation Management Hochschule St. Gallen, Reihe Innovation und Führung 14. April 2008 The Role of Open Systems in Innovation Management Hochschule St. Gallen, Reihe Innovation und Führung 14. April 2008 Dr. rer. nat. Hellmuth Broda Spokesperson and Individual Contributor, Liberty Alliance;

More information

Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance

Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance Christina Stephan, MD Co-Chair Liberty Alliance ehealth SIG National Library of Medicine

More information

A secure and auditable Federated Identity and Access Management Infrastructure. Serge Bertini Director, Security Canada

A secure and auditable Federated Identity and Access Management Infrastructure. Serge Bertini Director, Security Canada A secure and auditable Federated Identity and Access Management Infrastructure Serge Bertini Director, Security Canada The Role of the Identity While Perimeters dissolve Applications become more distributed

More information

Liberty Alliance Project Presented at itapa 2003 Dr. Hellmuth Broda Sun Microsystems CTO EMEA and Liberty Alliance Management Board Delegate

Liberty Alliance Project Presented at itapa 2003 Dr. Hellmuth Broda Sun Microsystems CTO EMEA and Liberty Alliance Management Board Delegate Liberty Alliance Project Presented at itapa 2003 Dr. Hellmuth Broda Sun Microsystems CTO EMEA and Liberty Alliance Management Board Delegate WWW.PROJECTLIBERTY.ORG 1 What is Liberty Alliance? Vision: A

More information

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost Timothy Siu SE Manager, JES Nov/10/2003 sun.com/solutions/

More information

This way, Bluewin will be able to offer single sign-on for service providers within the circle.

This way, Bluewin will be able to offer single sign-on for service providers within the circle. Clareity Security and The National Association of Realtors Develop a SAML Toolkit for the Real Estate Industry Ask any REALTOR about the systems they use and the passwords they deploy. The word mess will

More information

IDDY. Case Study: Rearden Commerce Delivers SaaS Via Federation WINNER

IDDY. Case Study: Rearden Commerce Delivers SaaS Via Federation WINNER 2007 IDDY AWARD WINNER Case Study: Rearden Commerce Delivers SaaS Via Federation Thanks to federation, Rearden Commerce makes it easier than ever for corporate employees to book and manage travel arrangements.

More information

EduTech Deploys Federated Identity for Maximum Impact

EduTech Deploys Federated Identity for Maximum Impact WINNER EduTech Deploys Federated Identity for Maximum Impact Case Study: EduTech, the organization that provides technology to 697 New York State school districts, was honored for their deployment of a

More information

Network Identity. 1. Introduction. Kai Kang Helsinki University of Technology Networking Laboratory kkang@cc.hut.fi

Network Identity. 1. Introduction. Kai Kang Helsinki University of Technology Networking Laboratory kkang@cc.hut.fi Network Identity Kai Kang Helsinki University of Technology Networking Laboratory kkang@cc.hut.fi Abstract: This paper is concerning on modern Network Identity issues, emphasizing on network identity management,

More information

Liberty Alliance Project Setting the Standard for Federated Network Identity

Liberty Alliance Project Setting the Standard for Federated Network Identity Liberty Alliance Project Setting the Standard for Network Identity Privacy, Identity Management and Services using Liberty technologies in Mobile Environment. Identity Management Rise of electronic networks:

More information

Accelerate Without Fear: Extend Your Enterprise with Identity Federation. Kirk Brown CTO, Identity Management Sun Microsystems

Accelerate Without Fear: Extend Your Enterprise with Identity Federation. Kirk Brown CTO, Identity Management Sun Microsystems Accelerate Without Fear: Extend Your Enterprise with Identity Federation Kirk Brown CTO, Identity Management Sun Microsystems 1 Welcome to the Participation Age Enterprise Collaborative Industry Networks,

More information

PROTECT YOUR WORLD. Identity Management Solutions and Services

PROTECT YOUR WORLD. Identity Management Solutions and Services PROTECT YOUR WORLD Identity Management Solutions and Services Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and

More information

Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone

Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone Although single sign-on (SSO) technology based on Liberty standards is being rapidly adopted by businesses, governments and

More information

Identity Federation Management to make Operational and Business Efficiency through SSO

Identity Federation Management to make Operational and Business Efficiency through SSO 2012 International Conference on Industrial and Intelligent Information (ICIII 2012) IPCSIT vol.31 (2012) (2012) IACSIT Press, Singapore Identity Federation Management to make Operational and Business

More information

Lots of workers, many applications, multiple locations......and you need one smart way to handle access for all of them.

Lots of workers, many applications, multiple locations......and you need one smart way to handle access for all of them. Lots of workers, many applications, multiple locations......and you need one smart way to handle access for all of them. imprivata OneSign The Converged Authentication and Access Management Platform The

More information

Federated Identity in the Enterprise

Federated Identity in the Enterprise www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember

More information

Choosing an SSO Solution Ten Smart Questions

Choosing an SSO Solution Ten Smart Questions Choosing an SSO Solution Ten Smart Questions Looking for the best SSO solution? Asking these ten questions first can give your users the simple, secure access they need, save time and money, and improve

More information

Cloud SSO and Federated Identity Management Solutions and Services

Cloud SSO and Federated Identity Management Solutions and Services Cloud SSO and Federated Identity Management Solutions and Services Achieving Balance Between Availability and Protection Discussion Points What is Cloud Single Sign-On (SSO) What is Federated Identity

More information

Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH

Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH Identity opens the participation age Open Web Single Sign- On und föderierte SSO Dr. Rainer Eschrich Program Manager Identity Management Sun Microsystems GmbH Agenda The Identity is the Network Driving

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

Leveraging New Business Models with Identity Management An e-learning case study

Leveraging New Business Models with Identity Management An e-learning case study Leveraging New Business Models with Identity Management An e-learning case study José M. del Álamo DIT, Universidad Politécnica de Madrid, Ciudad Universitaria s/n, 28040 Madrid, Spain jmdela@dit.upm.es,

More information

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology 20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business

More information

LIBERTY ALLIANCE. Case Study: Aetna Enhances Secure Provider Portal with SSO and SAML 2.0. The Company. Key Objectives

LIBERTY ALLIANCE. Case Study: Aetna Enhances Secure Provider Portal with SSO and SAML 2.0. The Company. Key Objectives Case Study: Aetna Enhances Secure Provider Portal with SSO and SAML 2.0 The Company Aetna is one of the nation s leading diversified health care benefits companies, serving approximately 37.2 million people

More information

Federation Proxy for Cross Domain Identity Federation

Federation Proxy for Cross Domain Identity Federation Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 m-hatake@ax.jp.nec.com

More information

Regulatory Compliance Using Identity Management

Regulatory Compliance Using Identity Management Regulatory Compliance Using Identity Management 2015 Hitachi ID Systems, Inc. All rights reserved. Regulations such as Sarbanes-Oxley, FDA 21-CFR-11 and HSPD-12 require stronger security, to protect sensitive

More information

Case Study: Federated Telco Billing: The Next Wave in E-Commerce

Case Study: Federated Telco Billing: The Next Wave in E-Commerce Case Study: Federated Telco Billing: The Next Wave in E-Commerce The Company ebiz.mobility was established in 2003 to provide a unique digital content payment processing solution for telcos, Internet service

More information

The Role of Federation in Identity Management

The Role of Federation in Identity Management The Role of Federation in Identity Management August 19, 2008 Andrew Latham Solutions Architect Identity Management 1 The Role of Federation in Identity Management Agenda Federation Backgrounder Federation

More information

Unisys Security Insights: Germany A Consumer Viewpoint - 2015

Unisys Security Insights: Germany A Consumer Viewpoint - 2015 Unisys Security Insights: Germany A Consumer Viewpoint - 2015 How consumers in Germany feel about: Personal data security, ranked by industry Experiences concerning security of personal data Research by

More information

ENTERPRISE SECURE IDENTITY IN THE CLOUD WITH SINGLE SIGN-ON AND STRONG AUTHENTICATION

ENTERPRISE SECURE IDENTITY IN THE CLOUD WITH SINGLE SIGN-ON AND STRONG AUTHENTICATION ENTERPRISE SECURE IDENTITY IN THE CLOUD WITH SINGLE SIGN-ON AND STRONG AUTHENTICATION Giuseppe Paternò, Director of GARL @gpaterno www.gpaterno.com MAKING THE CLOUD A SAFER SPACE ABOUT ME IT Architect

More information

IDDY. Case Study: ConAgra Deploys SSO for Travel Planning

IDDY. Case Study: ConAgra Deploys SSO for Travel Planning 2007 IDDY AWARD WINNER Case Study: ConAgra Deploys SSO for Travel Planning The Organization One of North America s largest packaged food companies, ConAgra Foods is a leading branded foods company and

More information

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress secure Identity and Access Management solutions user IDs and business processes Your business technologists. Powering progress 2 Protected identity through access management Cutting costs, increasing security

More information

New Zealand Sets the Pace for SAML 2.0 Deployments

New Zealand Sets the Pace for SAML 2.0 Deployments Case Study: New Zealand Sets the Pace for SAML 2.0 Deployments New Zealand proves that great things often come from small countries as it joins the ranks of e-government SAML 2.0 deployers with its wide-ranging

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and

More information

Biometric Single Sign-on using SAML Architecture & Design Strategies

Biometric Single Sign-on using SAML Architecture & Design Strategies Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems Ramesh.Nagappan@sun.com 1 Setting Expectations What you can take away! Understand

More information

- Identity & Access Management

- Identity & Access Management IBM Software Group NSHE - Identity & Access Management 2006 IBM Corporation Identity & Access Management Access Management and The Monitoring, Auditing and Reporting for Compliance So What s The Problem

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Royal Roads University_ Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they

More information

Internet Banking Internal Control Questionnaire

Internet Banking Internal Control Questionnaire Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?

More information

APIs The Next Hacker Target Or a Business and Security Opportunity?

APIs The Next Hacker Target Or a Business and Security Opportunity? APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone

More information

Passlogix Sign-On Platform

Passlogix Sign-On Platform Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

Security solutions Executive brief. Understand the varieties and business value of single sign-on.

Security solutions Executive brief. Understand the varieties and business value of single sign-on. Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies

More information

Case Study: Bluewin Implements Liberty Alliance Specifications for Single Sign-On

Case Study: Bluewin Implements Liberty Alliance Specifications for Single Sign-On Case Study: Bluewin Implements Liberty Alliance Specifications for Single Sign-On Company With approximately 2 million customers, Bluewin (www.bluwin.ch) is the largest Internet service provider in Switzerland

More information

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: sascha.neinert@rus.uni-stuttgart.de

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

Biometric Single Sign-on using SAML

Biometric Single Sign-on using SAML Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP Ramesh.Nagappan@sun.com 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On

More information

Identity Access Management: Beyond Convenience

Identity Access Management: Beyond Convenience Identity Access Management: Beyond Convenience June 1st, 2014 Identity and Access Management (IAM) is the official description of the space in which OneLogin operates in but most people who are looking

More information

Security management solutions White paper. Extend the value of SAP investments with Tivoli security management solutions.

Security management solutions White paper. Extend the value of SAP investments with Tivoli security management solutions. Security management solutions White paper Extend the value of SAP investments with Tivoli security management solutions. December 2005 2 Contents 2 Introduction 3 Help protect business-critical processes

More information

AND SUN OPENSSO MICROSOFT GENEVA SERVER ENABLING UNPRECEDENTED COLLABORATION ACROSS HETEROGENEOUS IT ENVIRONMENTS. White Paper May 2009.

AND SUN OPENSSO MICROSOFT GENEVA SERVER ENABLING UNPRECEDENTED COLLABORATION ACROSS HETEROGENEOUS IT ENVIRONMENTS. White Paper May 2009. MICROSOFT GENEVA SERVER AND SUN OPENSSO ENABLING UNPRECEDENTED COLLABORATION ACROSS HETEROGENEOUS IT ENVIRONMENTS White Paper May 2009 Abstract Interoperability between applications in heterogeneous technology

More information

IBM Security & Privacy Services

IBM Security & Privacy Services Enter Click Here The challenge of identity management Today organizations are facing paradoxical demands for greater information access and more stringent information security. You must deliver more data

More information

SAML:The Cross-Domain SSO Use Case

SAML:The Cross-Domain SSO Use Case SAML:The Cross-Domain SSO Use Case Chris Ceppi Oblix Corporate Engineer Ed Kaminski OBLIX Federal Business Manager 410-349-1828 ekaminski@oblix.com Mike Blackin Principal Systems Engineer Oblix, Inc. 202-588-7397

More information

Liberty Alliance. What's After Federation. Fulup Ar Foll Master Architect Sun Microsystems

Liberty Alliance. What's After Federation. Fulup Ar Foll Master Architect Sun Microsystems Liberty Alliance What's After Federation Fulup Ar Foll Master Architect Sun Microsystems What's About Federation Federation of providers (CoT), a group of entities providing services who signed agreement,

More information

New Generation of Liberty. for Enterprise. Fulup Ar Foll, Sun Microsystems Fulup@sun.com

New Generation of Liberty. for Enterprise. Fulup Ar Foll, Sun Microsystems Fulup@sun.com New Generation of Liberty TEG Federated Progress Architecture Update for Enterprise Fulup Ar Foll, Sun Microsystems fulup@sun.com 1 Identity Framework Problematic User Seamless (nothing is too simple)

More information

OIO SAML Profile for Identity Tokens

OIO SAML Profile for Identity Tokens > OIO SAML Profile for Identity Tokens Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 Profile Requirements 6 Requirements 6

More information

Identity Management. Critical Systems Laboratory

Identity Management. Critical Systems Laboratory Identity Management Critical Systems What is Identity Management? Identity: a set of attributes and values, which might or might not be unique Storing and manipulating identities Binding virtual identities

More information

VASCO: Compliant Digital Identity Protection for Healthcare

VASCO: Compliant Digital Identity Protection for Healthcare VASCO: Compliant Digital Identity Protection for Healthcare Compliant Digital Identity Protection for Healthcare The proliferation of digital patient information and a surge in government regulations are

More information

Federated Identity Architectures

Federated Identity Architectures Federated Identity Architectures Uciel Fragoso-Rodriguez Instituto Tecnológico Autónomo de México, México {uciel@itam.mx} Maryline Laurent-Maknavicius CNRS Samovar UMR 5157, GET Institut National des Télécommunications,

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: McGill University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

More information

Defending the Internet of Things

Defending the Internet of Things Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity

More information

Network Identity and the Liberty Alliance Project

Network Identity and the Liberty Alliance Project TAKE IT TO THE NTH Network Identity and the Liberty Alliance Project Marc Hamilton Director of Technology Sun Microsystems, Inc. marc.hamilton @sun.com Ismet Nesicolaci Systems Engineering Manager Sun

More information

Leveraging the Synergy between Identity Management and ITIL Processes

Leveraging the Synergy between Identity Management and ITIL Processes BEST PRACTICES WHITE PAPER Leveraging the Synergy between Identity Management and ITIL Processes Ken Turbitt, best practices director, BMC Software Rami Elron, senior system architect, Identity Management,

More information

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department jmikhael@masdar.ac.ae

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department jmikhael@masdar.ac.ae Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department jmikhael@masdar.ac.ae Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation

More information

Advanced Biometric Technology

Advanced Biometric Technology INC Internet Biometric Security Systems Internet Biometric Security System,Inc.White Papers Advanced Biometric Technology THE SIMPLE SOLUTION FOR IMPROVING ONLINE SECURITY Biometric Superiority Over Traditional

More information

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services

More information

Privacy and Security Best Practices

Privacy and Security Best Practices Version 2.0 November 12, 2003 Editor: Christine Varney, Hogan & Hartson Contributors: Piper Cole, Sun Microsystems William Duserick, Fidelity Jill Lesser, AOL Gary Podorowsky, Sony Paule Sibieta, France

More information

m Commerce Working Group

m Commerce Working Group m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking

More information

Achieving HIPAA and HITECH Compliance. with Enterprise Single Sign-On

Achieving HIPAA and HITECH Compliance. with Enterprise Single Sign-On Achieving HIPAA and HITECH Compliance with Enterprise Single Sign-On Achieving HIPAA and HITECH Compliance with Enterprise Single Sign-On 1 TABLE OF CONTENTS The Challenges of HIPAA and HITECH Compliance

More information

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda

More information

ITAR Compliance Best Practices Guide

ITAR Compliance Best Practices Guide ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations

More information

WHITE PAPER: MASSACHUSETTS DATA SECURITY REGULATIONS

WHITE PAPER: MASSACHUSETTS DATA SECURITY REGULATIONS WHITE PAPER: MASSACHUSETTS DATA SECURITY REGULATIONS Introduction Massachusetts regulations set forth minimum requirements for both the protection of personal information and the electronic storage or

More information

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks. Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted

More information

Tier 2 Business Guidelines: 401K Scenario

Tier 2 Business Guidelines: 401K Scenario Tier 2 Business Guidelines: 401K Scenario Introduction to the Abstract This whitepaper focuses on one specific Liberty Alliance-enabled application area: 401K servicing, provisioning, and support. As a

More information

Physician Champions David C. Kibbe, MD, & Daniel Mongiardo, MD FAQ Responses

Physician Champions David C. Kibbe, MD, & Daniel Mongiardo, MD FAQ Responses Physician Champions David C. Kibbe, MD, & Daniel Mongiardo, MD FAQ Responses DR. KIBBE S RESPONSES What is health information exchange? How can health information exchange help my practice? Can I comply

More information

Securing The Cloud With Confidence. Opinion Piece

Securing The Cloud With Confidence. Opinion Piece Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery

More information

Smart Identity Security: The Next Generation of Identity and Access Management

Smart Identity Security: The Next Generation of Identity and Access Management I D C V E N D O R S P O T L I G H T Smart Identity Security: The Next Generation of Identity and Access Management February 2006 Adapted from Worldwide Identity and Access Management 2005-2009 Forecast

More information

Identity and Access Management: The Promise and the Payoff

Identity and Access Management: The Promise and the Payoff 0 Identity and Access Management: The Promise and the Payoff How An Identity and Access Management Solution Can Generate Triple-digit ROI Netegrity White Paper June 18, 2003 Page 1 Identity and Access

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Authentication Privacy Principles Working Group

Authentication Privacy Principles Working Group Authentication Privacy Principles Working Group Interest in authentication systems has increased dramatically over the last two years. But widespread adoption of the technologies will only occur if individuals

More information

Application of Biometric Technology Solutions to Enhance Security

Application of Biometric Technology Solutions to Enhance Security Application of Biometric Technology Solutions to Enhance Security Purpose: The purpose of this white paper is to summarize the various applications of fingerprint biometric technology to provide a higher

More information

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden

More information

Identity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services

Identity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services Identity Management Overview Bill Nelson bill.nelson@gca.net Vice President of Professional Services 1 Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity)

More information

Federated Identity Management

Federated Identity Management Federated Identity Management SWITCHaai Introduction Course Bern, 1. March 2013 Thomas Lenggenhager aai@switch.ch Overview What is Federated Identity Management? What is a Federation? The SWITCHaai Federation

More information

Fujitsu Enterprise Security Architecture

Fujitsu Enterprise Security Architecture Fujitsu Enterprise Security Architecture V Tetsuo Shiozaki V Masayuki Okuhara V Nobuo Yoshikawa (Manuscript received November 9, 2006) Recently, there has been a growing need for enterprises to respond

More information

THE CHANGING FACE OF MOBILE PAYMENTS SECURITY

THE CHANGING FACE OF MOBILE PAYMENTS SECURITY THE CHANGING FACE OF MOBILE PAYMENTS SECURITY Past and Future of Authentication RAJIV DHOLAKIA NOK NOK LABS rajiv@noknok.com NOK NOK LABS NNL CARTES America APRIL 2013 1 CONSIDER THE HUMBLE IGNITION KEY

More information

The Primer: Nuts and Bolts of Federated Identity Management

The Primer: Nuts and Bolts of Federated Identity Management The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.

More information

Next-Era Home Health Care and Enhanced HIPAA Compliance

Next-Era Home Health Care and Enhanced HIPAA Compliance Next-Era Home Health Care and Enhanced HIPAA Compliance EMPOWERED BY MOBILE DOCUMENT MANAGEMENT AND DIGITAL PEN FORMS CAPTURE TECHNOLOGIES Agenda Purpose and Background Cultural Objectives ( Key Drivers

More information

Identity, Credential, and Access Management. Open Solutions for Open Government

Identity, Credential, and Access Management. Open Solutions for Open Government Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management www.idmanagement.gov Open Solutions for Open Government Judith Spencer Co-Chair, ICAM

More information

Avoid the Hidden Costs of AD FS with Okta

Avoid the Hidden Costs of AD FS with Okta Okta White paper Avoid the Hidden Costs of AD FS with Okta Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-adfs-031413 Table of Contents 1 Challenges of

More information

5 Things to Look for in a Cloud Provider When it Comes to Security

5 Things to Look for in a Cloud Provider When it Comes to Security 5 Things to Look for in a Cloud Provider When it Comes to Security In This Paper Internal technology services that lack resources, rigor or efficiencies are prime candidates for the cloud Understand the

More information

Online Identity Attribute Exchange 2013-2014 Initiatives

Online Identity Attribute Exchange 2013-2014 Initiatives Online Identity Attribute Exchange 2013-2014 Initiatives Agenda Overview AXN Services Framework Demonstration NSTIC Pilots Summary ABAC Services Attribute Exchange Network Page 2 AXN - Enabling IT & Other

More information

Liberty Specs Tutorial WWW.PROJECTLIBERTY.ORG

Liberty Specs Tutorial WWW.PROJECTLIBERTY.ORG Liberty Specs Tutorial WWW.PROJECTLIBERTY.ORG 1 Introduction to Liberty Alliance Overview & Key Concepts Resources Architecture and Spec documents Phase 1 - ID-FF Federated identity life-cycle Metadata

More information

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING 6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information

More information

PCI Data Security Standard

PCI Data Security Standard SSO Strong Authentication Physical/Logical Security Convergence A Pathway to PCI Compliance TABLE OF CONTENTS Executive Summary... 3 What is PCI?... 3 PCI Standards and Impacts on Global Business... 4

More information

The Primer: Nuts and Bolts of Federated Identity Management

The Primer: Nuts and Bolts of Federated Identity Management The Primer: Nuts and Bolts of Federated Identity Management Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities. With so

More information

Identity and Access Management

Identity and Access Management Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements

More information